Teaching Scheme

April 12, 2018 | Author: Anonymous | Category: Engineering & Technology, Computer Science, Networking
Share Embed Donate


Short Description

Download Teaching Scheme...

Description

Computer Security Topic 1

Name: Introduction to Computer Security and Security Trends

Knowledge Category

Example/s of category

Teaching methodology

FACT

Security

Use appropriate example of security (security guards in college gate)

CONCEPT

Assets

Show any peripheral devices of Computer or Network( Hard disk)

Viruses

Corrupted Files in pen drive

Terrorists

News, Videos of terrorist attack like 26/11 attack

Malware

Use any appropriate examplemalicious code transfer through mobile while sharing the data (Bluetooth)among people

Use any appropriate Confidentiality, Integrity, Availability, example – email Accountability

Risk

PRINCIPLE

PROCEDUR E Application

and

Use any appropriate example – person having large amount of cash in travelling

Security Attacks CIA Model

Use example of Hacker trying to attack on any email account Use any appropriate PPT

Risk Analysis

Use any appropriate PPT or Video

Steps in Attack Online application

Learning Resources: Books:

PPT

Online Shopping Banking

and

Online

Lecture No.

1

Topic/ Subtopic to be covered



Why focus on Security?– “Principals of Computer Security CompTIASecurity+andBeyndo” by Wm. Arthur Conklinchapter 1 Page No 1

E.g The Secureness of precious materials being stolen like gold, money, Mark sheet of student etc.) 

Definition of Computer Security “Computer Security” by Dieter Gollman Chapter 2, Page No 18



Why security is important (Need of security) “Cryptography and Network Security” by AtulKahate Chapter 1, Page no 1

Eg. Confidential information of defense save on computer of govt dept 

Basics of computer security – C, I, A Model Confidentiality - “Computer Security” by Dieter Gollman Chapter 2, Page No 20 Integrity - “Computer Security” by Dieter Gollman Chapter 2, Page No 21 Availability - “Computer Security” by Dieter Gollman Chapter 2, Page No 22 Accountability - “Computer Security” by Dieter Gollman Chapter 2, Page No 23 Non-repudiation - “Computer Security” by Dieter Gollman Chapter 2, Page No 23 * Draw pyramid model of CIA

Web Site - http://it.med.miami.edu/x904.xml *Note- Conclude the lecture with Block keywords & definitions and suitable diagram 2

 Examples of Application where security is important Eg: Bank where locker facility is provided Challenges in security – which are different barriers in security Eg: person tries different ways to crack the password of Computer 

Models of security

3  Define Risk “Computer Security” by Dieter Gollman Chapter 1, Page No 13

4

 What is Assets, Vulnerability and threats “Computer Security” by Dieter Gollman Chapter 1, Page No 10,11 (Harddisk is assest )  Formula for calculation of Risk “Computer Security” by Dieter Gollman Chapter 1, Page No 10 PPTs - www.cs.uiuc.edu/class/sp07/cs498ia/slides/CS46106.RiskAnalysis.ppt  What Quantitative & Qualitative Risk Analysis “Computer Security” by Dieter Gollman Chapter 1, Page No 13  Counter measures to mitigate the risk “Computer Security” by Dieter Gollman Chapter 1, Page No 14 Web Site – http://www.digitalthreat.net/2009/06/threat-vs-vulnerability-vs-risk/

5 

 What is Threat- Definition  What is different categories of Threats Definition of Virus and Worms – Differentiate between them

 “Principles of Computer Security: Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 1 Page no 7 “Cryptography and Network Security” by AtulKahate Chapter 1 Page no 16, 18

 Different types of Viruses – Life Cycle of Viruses (Draw Diagram) “Cryptography and Network Security” by AtulKahate Chapter 1 Page no 16 to 18

 Define Intruders & Insiders – Differentiate between them (Give real life example or any movie example) “Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 1 Page no 7,8

Web Sites –  http://www.f-secure.com/en/web/labs_global/threat-types  http://support.kaspersky.com/viruses/general/614  http://peterhgregory.wordpress.com/2009/03/14/security-basics-definitionsof-threat-attack-and-vulnerability/

6  Who is Criminal purpose(any movie example)

Organization



what is

their

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 1 Page no 9



Who is Terrorists – what is their aim/goals(any movie example)

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 1 Page no 9

 

Information Warfare Why there is need of Information Warfare

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 1 Page no 9



Avenues of Attacks (Example of any Criminal Activity)

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 1 Page no 11

 Steps in Attack – How attack can happen in any organization like Bank robbery “Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 1 Page no 12

7  What is Attack – Definition of attack  Active and Passive Attack – Differentiate between them, Classification of passive and active attacks “Cryptography and Network Security” by Atul Kahate Chapter 1 Page no 12 to 15



Denial of Service Attack (DOS & DDOS)

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 400

Web Site - http://www.slideshare.net/chintanjpatel/unit-1-33882940



8

Backdoor, Trapdoors

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 403



Sniffing

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 404



Spoofing

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 405, 406



Encryption Attack

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 410

9

Web Site –  https://www.parkbank.com/about/security/computer-security  http://vickyvikramaditya1.blogspot.in/2011/08/sniffing-and-spoofing.html PPT –  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web &cd=4&cad=rja&uact=8&sqi=2&ved=0CD8QFjAD&url=http%3A%2F%2 Fwww.pcs.cnu.edu%2F~dgame%2Fcs446Gen%2Ftopics%2FSniffing%2FS niffing.PPT&ei=5WKhU7a2E4OiugTag4CACQ&usg=AFQjCNE2f2hwh4v f1vWecSJh8I8D47Wy0g&bvm=bv.69137298,d.c2E  Man-in-middle attack “Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 408

 

Replay Attack TCP/IP Hacking

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 409 Web Site –  http://careerride.com/Networking-replay-attacks.aspx PPT –

10

 https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web &cd=14&cad=rja&uact=8&ved=0CF0QFjAN&url=http%3A%2F%2Fcsc.c olumbusstate.edu%2Fsummers%2Fnotes%2Fcs557%2F3mf%2FReplayAttacks.ppt&ei=S2OhU9T8GdGdugTCyoLQBw&usg=AFQjCNG0tQwkX Uxg0-6LnH-_ZzDNqSHlzw&bvm=bv.69137298,d.c2E  Definition of Malware “Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 415

 

Various categories of Malwares What is Virus and Logic Bombs

“Principles of Computer Security:Comp TIA Security+ and Beyond” by Wm. Arthur Conklin Chapter 15 Page no 418

Web site –  http://www.malwaretruth.com/the-list-of-malware-types/  http://www.kaspersky.co.in/internet-security-center/threats/malwareclassifications

Topic 2

Name: Authentication and Operational Security Objectives Knowledge Category

Example/s of category

Teaching methodology

FACT

People

Use appropriate example of people- Internet Users

Password

Show appropriate example- create password to authenticate user for PC or laptop or password for enrollment of admission Use appropriate example-(Iris) retina scan in Adhar Card Office Example-Login screen

Biometrics

CONCEPT

Managing Password

Example-Cash withdrawal at ATM

Role of People

Example-Changing PIN of ATM User Use appropriate PPT's

PRINCIPLE

Choosing a password

APPLICATION

Individual Responsibilities Thumb Reader

Use Appropriate example of Biometric like Attendance System using Thumb

Learning Resources: Books: Title: 1) “Cryptography and Network Security” by Atul Kahate Publisher – Tata McGraw Hill 2) “Computer Security” by Dieter Gollman Publisher – Wiley India 3) “Principles of Computer Security + and Beyond” by Wm. Arthur Conkin Publisher - Tata McGraw Hill Teaching Aids: Black Board, PPTS, Transparencies, Reference Book, Notes. PPTs: Preferably prepare PPTs containing https://depts.washington.edu/...security/your_role_information_secur.ppt  http://www.slideshare.net/vidita123/biometrics-final-ppt

Lecture No.

1

Topic/ Subtopic to be covered

  

Introduction to operational Security Understand meaning - role of people What is password?

“Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 3 “Operational and Organizational Security

*Note- Conclude the lecture with Block keywords & definitions and suitable diagram  Introduction to terms -identification, Authentication & operational Security  To understand role of people in security Cryptography & Network Security by AtulKahateChapter-7pg.nos 271-73

2

3

4



User Name & Password Computer Security by Dieter Gollman Chapter-3, Pg.Nos.36



How to choose & manage password? Computer Security by Dieter Gollman Chapter-3, Pg.Nos.37,38, 39



To understand what are threats while creating passwords.



Introduction to terms -identification, Authentication Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 11 Pg.nos-262



Describe different areas where security comes into picture. Cryptography & Network Security by AtulKahateChapte1 Page No.1 to 3

 

5

Discuss role of people in security Password Selection

Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.No-72



Piggybacking

Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.No-73



Shoulder Surfing

Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.No-70



Dumpster Diving

Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.No-74

6



Installing Unauthorized Software/Hardware Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.Nos-74,75



Access By Non-employee Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.No-75



Security Awareness Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.No-76



Individual User Responsibilities Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 4 Pg.Nos-77 Examples of role of people using suitable techniques.



 http://www.slideshare.net/Clarice_Wilson/atm-frauds-and-solutions

7



Define Access Control

Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 11 Pg.no-268



Discuss their principles & policies

Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 11 Pg.no-269

" Types of Access controls Principles of Computer Security Security + and Beyond” by Wm. Arthur Conklin Dwayne Chapter 11 Pg.nos-269,270

8

9

  

Introduction to Biometrics Types of Biometrics

10

      

Types of Biometrics & example Finger prints Hand print Retina Patterns Voice Patterns Signature &Writing Patterns Keystrokes Computer Security Principles & Practices " by William Stalling, Lawrie Brown Chapter-3 " pg.nos.92 to 97

PPT: 

http://www.slideshare.net/vidita123/biometrics-final-ppt

Topic 3

Name: Cryptography

Knowledge Category

Example/s of category

Teaching methodology

FACT

Plaintext

Use example of Plaintext–Human language (message:“welcometo third year diploma”)

Show any message is Codified by using. KEY

Key

Cipher Text

CONCEPT

Cryptography, Cryptanalysis, Cryptology

Encryption

Decryption

Private Key

Alphabet A Codified by key “3” to Alphabet “C”

Show example of codified message like “ABC” is code to “CDE” Use appropriate example to show the converting of plaintext to cipher text and vice-versa.

Show example of encoding plaintext to Cipher text: Eg.”Computer” to” retupmoc” Show example of decoding Cipher text to Plaintext Eg.“retupmoc” to “Computer” Show example of key which need to be kept secret: Eg. door key of own house or password of

Lecture No.

1

Topic/ Subtopic to be covered



Introduction to Cryptography “Computer Security” by Dieter Gollman Chapter 11, Page No 186 “Principles of Computer Security + and Beyond” by Wm. Arthur” chapter -5 ,Page No- 83 

Definition of Cryptography, Cryptanalysis and Cryptology “Cryptography and Network Security” by AtulKahateChapter2, Page No 38-39

 Identify and describe the types of cryptography “Principles of Computer Security + and Beyond” by Wm. Arthur” chapter -5 ,Page No- 84 

What is Plain text and Cipher Text? Plain text and cipher Text - “Cryptography and Network Security” by AtulKahateChapter2, Page No 40-41”

Website http://en.wikipedia.org/wiki/Cryptography  http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf  http://cs.stanford.edu/people/eroberts/cs181/projects/dvd- css/cryptography.htm

PPT –  http://www.sce.uhcl.edu/yang/teaching/csci5931netSecuritySpr05/nsech 02a.ppt



2

What is Substitution Technique?

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 41



State different type of substitution technique

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 42



Define Caesar’ciper? Explain with example ?

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 41-43



Working principle of mono alphabetic substitution technique

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 44-46

 How Poly alphabetic technique is different from mono alphabetic Cryptography and Network Security” by AtulKahate Chapter 2, Page No 47



Drawback of Substitution technique

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 48-54

Website http://www.cimt.plymouth.ac.uk/resources/codes/codes_u1_text.pdf

PPTs sce.uhcl.edu/yang/public/Modules/.../Substitution%20Ciphers.ppt 

3

What is Transposition Technique?

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 54



Working principle of rail fence technique with example

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 54-55



Working principle of Simple Columnar with example

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 54-58



What is Stenography? State its advantage and disadvantages

Cryptography and Network Security” by AtulKahate Chapter 2, Page No 73-74

“Principles of Computer Security + and Beyond” by Wm. Arthur” Chapter -5 Cryptography, page 101-103

Websitehttp://www.cs.man.ac.uk/~banach/COMP61411.Info/CourseSlides/Wk1.2.Classical .pdf PPTs -www.eecis.udel.edu/~mills/teaching/eleg867b/crypto_slides/ch02.ppt

4



Define Encryption? Show a block diagram of encryption Cryptography and Network Security” by AtulKahate Chapter 2, Page No 59



Define Decryption? Show a block diagram of Decryption Cryptography and Network Security” by AtulKahate Chapter 2, Page No 59-62



State the sketch of Symmetric key cryptography and problem of Key Distribution Cryptography and Network Security” by AtulKahate Chapter 2, Page No 62-71

Website:  http://www4.ncsu.edu/~kksivara/sfwr4c03/lectures/lecture9.pdf

PPTs - cs.ecust.edu.cn/~yhq/course_files/security/topic2.ppt 5



Name the algorithm uses for Symmetric key cryptography Cryptography and Network Security” by AtulKahate Chapter 2, Page No 100

“Principles of Computer Security + and Beyond” by Wm. Arthur” Chapter -5 Cryptography, page 91-94 

Conceptual working of DES along with diagram Cryptography and Network Security” by AtulKahate Chapter 2, Page No 101

Computer Security” by Dieter GollmanChapter -11,Page No-199-202”



Processing step in DES Cryptography and Network Security” by AtulKahate Chapter 2, Page No 102-103

Website:  http://cs.ucsb.edu/~koc/cs178/docx/w04x-des.pdf

PPTs - islab.csie.ncku.edu.tw/course/slide/ch_06.ppt

6



Details of each step in DES Algorithm along with block diagram a) What is happening the Initial permutation (IP) Cryptography and Network Security” by AtulKahate Chapter 3, Page No -102-103

b) Details of one Round in DES Cryptography and Network Security” by AtulKahate Chapter 3, Page No -103

i.

Step 1- Key transformation

Cryptography and Network Security” by AtulKahate Chapter 3, Page No -104

ii.

Step2- Expansion permutation

Cryptography and Network Security” by AtulKahate Chapter 3, Page No -104-105

iii. Step3- S- Box Substitution Cryptography and Network Security” by AtulKahate Chapter 3, Page No -105-108

iv.

Step 4-P- Box substitution

Cryptography and Network Security” by AtulKahate Chapter 3, Page No -108-109

v.

Step 5- XOR and swap

Cryptography and Network Security” by AtulKahate Chapter 3, Page No -109-110

c)Variation of DES Cryptography and Network Security” by AtulKahate Chapter 3, Page No -111

Website http://cs.ucsb.edu/~koc/cs178/docx/w04x-des.pdf  https://www.google.co.in/search?q=des%20algorithm&tbm=isch&ei=LGW mU8m1MtaD8gWpnYKwAQ#facrc=_&imgdii=_&imgrc=GRgKBo8qM0i ufM%253A%3BXIxHOqkYyDZ7mM%3Bhttp%253A%252F%252Fi1.ytim g.com%252Fvi%252FiayDUAGu9Ec%252Fhqdefault.jpg%3Bhttp%253A %252F%252Fwww.youtube.com%252Fwatch%253Fv%253DiayDUAGu9E c%3B480%3B360

PPTs -islab.csie.ncku.edu.tw/course/slide/ch_06.ppt

7

i.

“What is Asymmetric key cryptography? “Cryptography and Network Security” by AtulKahate Chapter 4,Page No-154-156



Compare Symmetric key cryptography and Asymmetric key cryptography “Cryptography and Network Security” by AtulKahate Chapter 4,Page No-161



Introduction to Digital Signature “ Cryptography and Network Security” by AtulKahate Chapter 4,Page No-165-166

“Principles of Computer Security + and Beyond” by Wm. Arthur” Chapter -5 Cryptography, page 106-107,126,130 “Computer Security” by Dieter GollmanChapter -11,Page No-194-195

Website http://www.icg.isy.liu.se/courses/tsit03/forelasningar/cryptolecture08.pdf  http://technet.microsoft.com/en-us/library/cc962021.aspx

PPTs -http://www.slideshare.net/rohitbhatta/introduction-to-digital-signatures 

8

Basis of Digital signature

Cryptography and Network Security” by AtulKahate Chapter 4,Page No-166-167 Computer Security” by Dieter GollmanChapter -11,Page No-194-195”  Basis for Hashing Concept

Principles of Computer Security + and Beyond” by Wm. Arthur” Chapter 5 page 87-89 Computer Security” by Dieter Gollman Chapter -11,Page No-192-194”

http://technet.microsoft.com/en-us/library/cc962016.aspx 

Message digest

Principles of Computer Security + and Beyond” by Wm. Arthur” Chapter -5 page 90 Cryptography and Network Security” by AtulKahate Chapter 4,Page No-167-196

Web Site –  http://www.cs.iit.edu/~cs549/lectures/CNS-5.pdf  http://www.cs.uiuc.edu/class/fa07/cs498mmp/slides/TFC-F07-Lect15.pdf  https://www.entrust.com/wp-content/uploads/2013/05/cryptointro.pdf 

http://technet.microsoft.com/en-us/library/cc962033.aspx

Topic 4

Name: Computer Security Technology and Intrusion Detection Knowledge Category

Example/s of category

Teaching methodology

FACT

Attack

Use appropriate example to show how attacker attack on Computer security –Eg- attack on particular personal computer to obtained bank account number .

Show Attacker try to enter from weak entry point or bypass the security level Eg: illegal accessing particular bank account to transfer money

Intrusion

Eg-Theft try to enter through window or door

Standard Protocols CONCEPT

Firewall

Virtual Network

Kerberos

appropriate exampleEgFile transfer –FTP Use appropriate example to show firewall mechanismEg Compound wall for Building, Barrier on Road sides. Restricted access to particular website in College

Use appropriate example to private communication Private over public network E.g.: Walky Talky in Army for communicating between soldiers. Use appropriate ppt to show

Lecture no

1

Topic/ Subtopic to be covered



Introduction to Firewall “Computer Security” by Dieter Gollman Chapter 13, Page No 247 “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:435-436



Definition of Firewall “Computer Security” by Dieter Gollman Chapter 13, Page No 247



Need for Firewall in Computer security and network “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:436



Characteristics of Good Firewall “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:437



Types of Firewall and Firewall polices “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:437

“Computer Security” by Dieter Gollman Chapter 13, Page No 248, 249 

Limitation and problem in Firewall

“Computer Security” by Dieter Gollman Chapter 13, Page No 250 “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:452

Website http://www.dis.uniroma1.it/~alberto/didattica/cns-slides/firewalls.pdf  http://www.cs.iit.edu/~cs549/slides/chapter-14.pdf

PPT  www.cs.kau.se/cs/education/courses/dvgc03/p4/Firewalls.ppt

2



Working of packet filtering in firewall

“Computer Security” by Dieter Gollman Chapter 13, Page No 248 “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:438



Working of Application gateway

“Computer Security” by Dieter Gollman Chapter 13, Page No 249 “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:441



Working of Circuit level gateways

“Computer Security” by Dieter Gollman Chapter 13, Page No 249 “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:442



Implementation of Firewall and Firewall configuration “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:448-451

Website:  http://www.interpole.net/interpole/products/firewall/interwall/details

3

i.

Introduction to VPN “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:469

“Principles of ComputerCompTIA Security +and beyond” by WM.ArthurConklin,Page No 283



VPN Architecture “Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:470-472



Types of VPN

“Cryptography and Network Security” by AtulKahateChapter 13 ,Page No:472

Website http://ptgmedia.pearsoncmg.com/images/1587051796/samplechapter/1587051796c ontent.pdf

PPT www.csun.edu/~vcact00f/311/termProjects/.../VPNpresentation.ppt

4



Introduction

to

Kerberos Computer Security” by Dieter Gollman Chapter 12, Page No 219-221



Relation of Kerberos with Authentication

“Principles of ComputerCompTIA Security +and beyond” by WM.Arthur Conklin i.Chapter 11Page No- 263-264

5



How does Kerberos work “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin Chapter 11 Page No -263-264 “Cryptography and Network Security” by AtulKahateChapter 7Page No-372-377

“Cryptography and Network Security” by William Stallings Chapter 14 Page No 412-413

Website:  http://cs.brown.edu/cgc/net.secbook/se01/handouts/Ch09-Kerberos.pdf  http://www.cs.kent.edu/~farrell/grid06/lectures/KERBEROS.pdf  http://technet.microsoft.com/en-us/library/cc780469(v=ws.10).aspx  https://www.google.co.in/search?q=kerberos+authentication&espv=2&source=lnm s&tbm=isch&sa=X&ei=BOimU6HJCNCQuASPr4C4BQ&ved=0CAYQ_AUoAQ &biw=1024&bih=634#facrc=_&imgdii=_&imgrc=IuJfsiiiaao9WM%253A%3BRh 0gI3z74Tb68M%3Bhttp%253A%252F%252Fwww.zeroshell.org%252Fkerberos% 252Fimage%252Fkrbmsg.gif%3Bhttp%253A%252F%252Fwww.zeroshell.org%2 52Fkerberos%252FKerberos-operation%252F%3B638%3B532

6



State different types of Security topology “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin

Chapter 9 Page No206-207  What are Security Zones “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin Chapter 9 Page No218--221  How the DMZ work “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin Chapter 9 Page No219 “Cryptography and Network Security” by AtulKahate chapter13 Page no-451-452



Working of VLAN “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin

Chapter 9 Page No222 Website https://www.google.co.in/ search?q=Security+zone&espv=2&source=lnms&tbm=isch&sa=X&ei=oeimU6v MMdeeugTzloJA&ved=0CAYQ_AUoAQ&biw=1024&bih=634#facrc=_&imgdii =_&imgrc=mJa95BMkxqnx_M%253A%3BI06ak8wtCiM2M%3Bhttp%253A%252F%252Fi.msdn.microsoft.com%252Fdynimg%252F IC11169.gif%3Bhttp%253A%252F%252Fmsdn.microsoft.com%252Fenus%252Flibrary%252Fcc507438(v%253Dvs.85).aspx%3B451%3B399



http://www.cse.wustl.edu/ ~jain/cis788-97/ftp/virtual_lans/

PPT-www.cc.gatech.edu/classes/AY2014/cs4270.../4270-vlan-tutorial.ppt

7



What Intruders? state its three types

“Cryptography and Network Security” by AtulKahatechapter 13 Page No 472-473

“Computer Security” by Dieter Gollman. Chapter 13 Page No-251 

Basic of Intrusion detection System

“Cryptography and Network Security” by AtulKahatechapter 13 Page No 473-474

“Computer Security” by Dieter Gollman. Chapter 13 Page No-252 

Types of IDS

“Cryptography and Network Security” by AtulKahatechapter 13 Page No 474-475

“Computer Security” by Dieter Gollman. Chapter 13 Page No-253  Three Logical Component of IDS “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin Chapter 13 Page No 321



Honey pots

“Cryptography and Network Security” by AtulKahatechapter 13 Page No 475

“Computer Security” by Dieter GollmanChapter 13 Page No 254 Websites http://www.ee.tamu.edu/~reddy/ee689_04/pres_sumitha_james.pdf

PPT -www.cs.utexas.edu/users/ygz/395T-01F/reading/arun.ppt

8

 What is Host based IDS ?Show its Components “Computer Security” by Dieter GollmanChapter 13 Page No.253 “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin .Chapter 13 Page No-323 Cryptography and Network Security” by AtulKahatechapter 13 Page No 474—475



What is Network Based IDS? Show its Components Computer Security” by Dieter GollmanChapter 13 Page No.253 “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin .Chapter 13Page No -323 Cryptography and Network Security” by AtulKahatechapter 13 Page No 475

State Advantage of NIDS and Disadvantage of NIDS “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin .Chapter 13Page No -32

PPT - www.cs.northwestern.edu/~ychen/classes/msit458-f11/ids.ppt

9

 Why Email security standard is required ? Cryptography and Network Security” by AtulKahate chapter 6 Page No- 307-308

 Working Principle of SMTP along its diagram Cryptography and Network Security” by AtulKahate chapter 6 Page No- 308-310

 What is PEM? Cryptography and Network Security” by AtulKahate chapter 6 Page No- 310-311

 State Four Operation in PEM ? Cryptography and Network Security” by AtulKahate chapter 6 Page No- 311-312

 Describe each Step in PEM Operation in detail Cryptography and Network Security” by AtulKahate chapter 6 Page No- 311-314

Website:  http://www.hydtechwriter.com/what-is-simple-mail-transfer-protocol-smtp/

PPT- www.cs.huji.ac.il/~sans/students_lectures/PEM.ppt

10

 Describe PGP Cryptography and Network Security” by AtulKahate chapter 6 Internet Security Protocol Page No- 314-315 “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin . Chapter 16Page No 433

 How PGP Works Cryptography and Network Security” by AtulKahate chapter 6 Internet Security Protocol Page No- 314-315 “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin . Chapter 16Page No 433

 State step wise Operation in PGP Cryptography and Network Security” by AtulKahate chapter 6 Internet Security Protocal Page No- 315-316

 What is S/MIME ?Describe working principle of S/MIME Cryptography and Network Security” by AtulKahate chapter 6 Internet Security Protocal Page No- 322-326

11



Introduction of IP Security Cryptography and Network Security” by AtulKahate chapter9 Page No-452-453 “Computer Security” by Dieter Gollman Chapter 13 Page No -239



Overview of IPSecalong with its Application and advantage Cryptography and Network Security” by AtulKahatechapter9 Page No-454-455 “Cryptography and Network Security “by William Stalling Chapter 16 PageNo-485486

 2 types IPsec Protocol Cryptography and Network Security” by AtulKahatechapter9 Page No-455-457 “Cryptography and Network Security “by William Stalling Chapter 16 PageNo-486487



Draw the format of AH Header in IPSec Cryptography and Network Security” by AtulKahatechapter9 Page No-459-463 “Computer Security” by Dieter Gollman Chapter 13 Page No -239 “Cryptography and Network Security “by William Stalling Chapter 16 PageNo-494496



Draw the format of ESP in IPSec Cryptography and Network Security” by AtulKahatechapter9 Page No-464-465 “Computer Security” by Dieter Gollman Chapter 13 Page No -239 “Cryptography and Network Security “by William Stalling Chapter 16 PageNo-498500

Website:  http://securityweekly.com/presentations/IPSEC.pdf  http://technet.microsoft.com/en-us/library/cc776369(v=ws.10).aspx https://sc1.checkpoint.com/documents/R76/CP_R76_VPN_AdminGuide/13847.ht m  http://www.isaserver.org/articles-tutorials/articles/IPSec_Passthrough.html

12



What is Security Association “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin Chapter11 Page No:284-285

 What is IPSec Configuration “Principles of Computer CompTIA Security +and beyond” by WM.Arthur Conklin Chapter11 Page no-285-286



Describe the Tranport and Tunnel Modes of AH Header in IPSec Cryptography and Network Security” by AtulKahatechapter9 Page No-463



Describe the Transport and Tunnel Modes of ESP in IPSec Cryptography and Network Security” by AtulKahatechapter9 Page No-464-466

Website:  http://www.isaserver.org/articles-tutorials/articles/IPSec_Passthrough.html  http://www.deepsh.it/networking/IPSec.html  https://techlib.barracuda.com/display/bngv52/how+to+create+an+ipsec+vpn+tunne l+between+the+barracuda+ng+firewall+and+a+pfsense+firewall  http://flylib.com/books/en/3.190.1.135/1/  https://training.apnic.net/docs/eSEC03_IPSec_Basics.pdf

PPT-www.cs.northwestern.edu/~ychen/classes/mitp-458/ipsec.pp

Topic 5

Name: IT Act and Cyber Law Knowledge Category

Example/s of category

Teaching methodology

FACT

File

Use appropriate example of any Software File like DOC, PPT or EXE file

Act

Use appropriate example of any Government Ragging Act 2009 or any related IT Act or IPC Act, Copyright Act

Crime

Use appropriate example of Crime For example – Internet Fraud, any Criminal Activity or Hacking Computer System

Law

CONCEPT

Cyber Crime Hacking & Cracking

Piracy

Investigation

Use appropriate example of Indian Government Law like Murder Law etc Use any appropriate PPT Use any appropriate example of Hacking like Facebook hacking etc. Use any appropriate example like Software Piracy, CD Piracy etc Use any appropriate

Lecture No.

1

Topic/ Subtopic to be covered

        PPTs    

What is Data Recovery What is Computer File - Reasons of Data lost Procedure to recover Deleted file from FAT & NTFS Partition What is Partitioning in Computer System – Types of Partitions Reasons of Partition damage Formatted Partition Recovery Procedure (FAT / NFTS) Data Recovery Categories & different Tools available Procedure of Data Recovery & Ethics

http://www.aboutpartition.com/types-of-hard-drive-partitions/ http://www.recuperationdedonneesperdues.com/data-recovery http://www.robertuniverse.com/introduction-to-data-recovery/ http://psonlinehelp.equallogic.com/V4.2/Content/AdminNewBook/AdminN ew_recover.htm  http://transparen.com/data-protection-group/data-recovery-ethics

2

 What is Cyber Crime “Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 181  Different Types of Cyber Crime “Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 182  What is Hacking & Cracking – Types of Hackers  Virus & its attacks  Define terms – Pornography, Software Piracy “Information Security and Cyber Laws” by Saurabh Sharma Chapter 7 Page no 174 PPTs –  http://www.slideshare.net/aemankhan/cybercrimeppt-27376284  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7 &cad=rja&uact=8&sqi=2&ved=0CEIQFjAG&url=http%3A%2F%2Fwww. cyberseminar.cdit.org%2Fpdf%2F09_02_09%2Floknath.ppt&ei=kceiU_aJ9OHuATko4BA&usg=AFQjCNGmpx90JfvtJWuJde2U7XfLaVF7Zg&bv m=bv.69411363,d.c2E

3

4

 Intellectual Property – Copyright & Industrial Property “Information Security and Cyber Laws” by Saurabh Sharma Chapter 7 Page no 166 http://www.wipo.int/export/sites/www/freepublications/en/intproperty/450/ wipo_pub_450.pd  Which are different types of legal Systems & its laws  Define term – Mail Bombs, Bug Exploits  Cyber Crime Investigation – its procedure PPTs –  http://www.slideshare.net/mahmoodttc/intellectual-property-ppt-final  http://www.slideshare.net/tabrezahmad/cybercrime-investigation  http://www.scribd.com/doc/94789254/Ppt-on-Investigation-Method-ofCyber-Crime  Need of Cyber Law & What is Cyber Law “Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 184 & 187  IT Act 2000- Objectives, Scope, Provisions, Advantages & disadvantages “Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 185  IT Act 2008 – Modification in IT Act 2000, Characteristics PPTs http://www.slideshare.net/YogendraWagh/it-act-ppt-1111  http://www.powershow.com/view1/268863ZDc1Z/Information_Technology_Act_2000_v_s_2008_powerpoint_ppt_pre sentation  http://www.slideshare.net/Arnab_Roy_Chowdhury/cyber-law-15036761

Topic 6

Name: Application and Web Security Knowledge Category

Example/s of category

Teaching methodology

FACT

Standard Protocols

Demonstrate with

SSL,TLS

suitable Chart

Web security threats

CONCEPT

Hotfix Patch Upgrades

Small section of code designed to fix problems Ex- Any work done on Windows 2000 is targeted at the next service pack and hotfixes are built against the existing available base.

Lecture No.

1

Topic/ Subtopic to be covered

  

What is application hardening ? What is Patches? What is Web security? “Principles of Computer Security CompTIA Security +and beyond” by WM.Arthur Conklin Chapter-14 pg.nos-373 to 378

2

   

How web server works? What is active Directory? Web security threats Web security approaches

3



Working of SSL,TLS i. "Cryptography & Security" by C.K.ShyamalaN.HariniDr T R Padmanabhan Chapter-11 Pg. nos358 to391 ii. AtulKahate Cryptography & Network Security Chapter-6. Pg.nos-218 to 231

PPT4

 www.smsvaranasi.com/KMC/kmc_ppt/islc/SET.ppt  Working of SET i. "Cryptography & Security" by C.K.ShyamalaN.HariniDr T R Padmanabhan Chapter-11 Pg. nos391 to 415 ii. "Cryptography & Network Security "by AtulKahate Security Protocols" Pg.nos 231 to 251

PPT  euclid.barry.edu/~zuniga/courses/cs477/SET.ppt

Chapter-6. "Internet

Information Security Topic 1

Name: Introduction security & Model Knowledge Category

Example/s of category

FACT

Security

CONCEPT

PRINCIPLE

Teaching methodology

Use appropriate example of security – security guards outside office Ex: Students data that is Data details through which you can easily find out any student. Three pillars of Use any appropriate PPT and example – email information security Confidentiality, Integrity, Availability Information security CIA principles

Learning Resources: Books:  “Principles of Information Security” By Whitman Publisher - Cengage india  “Information System Security” by Godbole Nina Publisher - John Wiley  “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Publisher – Pearson  “Information Security & Cyber Laws” by Saurabh Sharma Publisher Vikas Publishing House Teaching Aids: Black board, Chalk, Transparencies, Power point presentation slides(PPTs), Reference books, notes, LCD projector/OHP Projector PPTs- PPT with Sample: Preferably prepare PPTs containing(Keyword in Google search:- “ppt for event classification in information security” Select “ 2nd Link”)  www.oic-ci.gc.ca/eng/DownloadHandler.ashx?...security.ppt 

Websites https://www.cs.duke.edu/courses/summer04/cps001/.../Lecture15.ppt

Lecture No.

Topic/ Subtopic to be covered

1

2

   

Define Security – Example of Security Guard Define Information – Example like Student / Employee Data What is the need of information? – Area where information is used Why information is important? – what are the advantages of Information in day to day life “Principles of Information Security” By Nina Godbole Chapter -5 Note – Summarize the key points & definitions of Topic  Example of application where information is important  Example: Governments, commercial businesses, and individuals are all storing information electronically - compact, instantaneous transfer, easy access  Ability to use information more efficiently has resulted in a rapid increase in the value of information  Define Information Security “Principles of Information Security” By Nina Godbole Chapter -1 Page No 1 to 5

PPT 3

4

5

6

7

8

iii. https://www.cs.duke.edu/courses/summer04/cps001/.../Lecture15.ppt  How information is classified?  Which criteria is required for classification of Information – List various criteria “Principles of Information Security” By Nina Godbole Chapter -5 Page No 76 to 80  What is the need of security  Why information security is important? “Principles of Information Security” By Nina Godbole Chapter -1 Page No 2,3  Basic principles of information security – Show Pyramidal Model of CIA  Confidentiality- Authorized user should able to access information  Integrity- Authorized user should able to modify information  Availability- whether authorized users or host should be available

 Which are pillars of Information security?  Demonstrate with diagram “Principles of Information Security” By Nina Godbole Chapter -5 Page No 73 to 75  What is data obfuscation? Example for data obfuscation “Principles of Information Security” By Nina Godbole Chapter -5 Page No 81, 82  Event classification “Principles of Information Security” By Nina Godbole Chapter -5 Page No 83 to8 5

PPT iv. www.oic-ci.gc.ca/eng/DownloadHandler.ashx?...security.ppt

Topic 2 Name: Information Security Architecture and Model Knowledge Category

Example/s of category

Teaching methodology

FACT

Information

Use example like Data

Security

CONCEPT

Management

Use appropriate example of Management – College management system etc.

Standards

User appropriate examples like ISO standard

Guidelines

Policy

PROCEDURE

User appropriate examples like Guidelines of writing paper, experiments etc. User appropriate examples like Password Selection Policy

Confidentiality Model

User appropriate examples like belief in relationship User appropriate PPTs &

Integrity Model

examples

Trust PRINCIPLE

Use appropriate example of security – security guards

Evaluation Criteria – User appropriate PPTs & TCSEC

examples Department of Defense (India/U.S.)

Learning Resources:: Books:  “Information System Security” by Godbole Nina Publisher - John Wiley  “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt Publisher – Pearson Teaching Aids: Black board, Chalk, Transparencies, Power point presentation slides(PPTs), Reference books, notes, LCD projector/OHP Projector

Lecture No.

Topic/ Subtopic to be covered

1

 What is Information Security, Why Information Security (Revision)  Definition of Risk Management o Use suitable example like organization, College etc.  Components of Risk Management o Diagram of Components & explain each component Web Site –  http://demop.com/articles/what-is-information-security.pdf  http://www.investopedia.com/terms/r/riskmanagement.asp  http://www.whatisriskmanagement.net/  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1& cad=rja&uact=8&ved=0CBsQFjAA&url=http%3A%2F%2Fwww.specialoly mpics.bc.ca%2Fsites%2Fdefault%2Ffiles%2FSanctioning%2520%2520Risk%2520Management.doc&ei=MFOlU4WRO9CVuATUtoDoCw& usg=AFQjCNF6CfirRE9Si7HfgGcz0KoL2HLzuA&bvm=bv.69411363,d.c2 E PPts –  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8& cad=rja&uact=8&sqi=2&ved=0CDoQFjAH&url=http%3A%2F%2Fwww.ju st.edu.jo%2F~tawalbeh%2Faabfs%2Fiss6753%2Fpresentations%2FRMP.ppt &ei=ZlOlU8SkE9CKuATpzYDoCg&usg=AFQjCNHFQFBF90DQB0kiin7e EJr1zoDvHA&bvm=bv.69411363,d.c2E  How to Identify Risk  Calculation of Risk – Show formula for calculation of Risk  Quantitative & Qualitative Risk Analysis – Give comparison with example “Information System Security” by Nina Godbole Chapter No 6, Page no 92,93 “Computer Security” by Dieter Gollman Chapter 2, Page No 26  “Information System Security” By Nina Godbole  What is Security Policy – Types of Policies “Information System Security” by Nina Godbole Chapter No 4, Page no 57, 58  What is Guidelines & Standards – o Give example like Guidelines for Online exam etc. o Give example like ISO etc. “Information System Security” by Nina Godbole Chapter No 4, Page no -61 Web Site –  http://www.pearsonitcertification.com/articles/article.aspx?p=418007&seqN um=5

2

3

4

5

 Trusted Computing Base (TCB)- Definition, Features & Elements “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -118  What is Ring of Trust – Use diagram “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -119  Ring of Trust for Stand-alone systems & for Network environment o Use diagram “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -120, 121 Web Site –  http://searchsecurity.techtarget.com/definition/trusted-computing-base  http://link.springer.com/chapter/10.1007/978-3-642-04831-9_10#page-1 PPTs –  https://wiki.engr.illinois.edu/download/attachments/183272958/trustelements-and-examples.pdf?version=1&modificationDate=1318426648000   What is Protection mechanisms o Use example like Antivirus, CCTV cameras etc.  Different Protection Mechanisms in TCB– Prepare Chart “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -121 to 123  Process Isolation  Principles of least privilege  Hardware Segmentation  Layering  Abstraction  Data Hiding



6

7

Information Storage – Prepare the Chart & display  Primary & Secondary Storage  Real & Virtual Memory  Random Memory  Sequential Storage  Volatile Memory  Closed & Open System  Multitasking, Multiprogramming & Multiprocessing System  Finite State Machine

Web Site –  http://www.cl.cam.ac.uk/~rja14/policy11/node22.html#SECTION000490000 00000000000  PPTs  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7& cad=rja&uact=8&ved=0CEAQFjAG&url=http%3A%2F%2Fwww.aast.edu %2Fpheed%2Fstaffadminview%2Fpdf_retreive.php%3Furl%3D373_23865_ CR415_2011_1__1_1_merkow_ppt_05.ppt%26stafftype%3Dstaffcourses&e i=gFilU6PwJtiXuAT99oLQCQ&usg=AFQjCNGWq3ilHnruRPVVKLYpuqxTUWGRA&bvm=bv.69411363,d.c2E  System Security Assurance Concepts ii. Functional & Assurance Requirement iii. Goals of Security Testing iv. Formal Security Testing Models “Principles of Information Security” By Nina Godbole Chapter -5 Page No 83 to8 5

8   

What is Trusted Computer Security Evaluation Criteria (TCSEC) “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -125 Purpose of TCSEC Classes of Divisions of TCSEC  Prepare Chart for use of Divisions and Classes “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -126, 127 c) Division D d) Division C – Class C1 & Class C2

9

e) Division B – Class B1,Class B2, Class B3 f) Division A – Class A1 “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt Chapter No 5 Page No -127, 128, 129 Web Site –  http://www.cse.psu.edu/~tjaeger/cse443-s12/docs/ch12.pdf  http://www.boran.com/security/tcsec.html

10 

What is Information Technology Security Evaluation Criteria (ITSEC) “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -129  Comparison of ITSEC & TCSEC “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -130  ITSEC Purposes & Assurance Classes – E0 to E6 o Prepare chart for description of E0 to E6 Web Site –  http://www.iwar.org.uk/comsec/resources/standards/itsec.htm  http://www.newstaff.com/criteria/itsec/levels/index.html  http://www.cse.dcu.ie/essiscope/sm2/beyond/itsec.html

11 

What is Confidentiality & Integrity Model – Different Models “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -141, 142  Bell-LaPadula Model  Biba Integrity Model “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt Chapter No 5

12

Web Sites –  http://www.digitalthreat.net/2010/05/information-security-models-forconfidentiality-and-integrity/ PPTs  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8& cad=rja&uact=8&ved=0CEUQFjAH&url=http%3A%2F%2Fwww.cs.gsu.ed u%2F~cscyqz%2Fcourses%2Faos%2Fslides09%2Fch8.3-Fall09XiaoChen.ppt&ei=01ylU80n1J66BM6TgLgD&usg=AFQjCNF75f57UF6r4d CxBVAEZVSPZEJHzw&bvm=bv.69411363,d.c2E  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10 &cad=rja&uact=8&ved=0CFEQFjAJ&url=http%3A%2F%2Fwww.etcs.ipfw .edu%2F~steffen%2FITT%2FOld-PP%2FChapter%25205Network%2520SecurityITT.ppt&ei=01ylU80n1J66BM6TgLgD&usg=AFQjCNFsMY6g2X8tr2dPvo mZbaIldMrVvg&bvm=bv.69411363,d.c2E  Advanced Models- Definition and Use “Information Security Principles and Practices” by Mark Merkow & Jim Breithaupt” Chapter No 5, Page No -142 vi. Clark &Wilson Model vii. Noninterference Model viii. State Machine Model ix. Access Matrix Model x. Information Flow Model Web Sites –  http://www.commondork.com/2010/05/16/bell-la-padula-biba-andclark-wilson-security-models/  http://crypto.stanford.edu/~ninghui/courses/Fall03/papers/landwehr_s urvey.pdf

Topic 3

Name: Cryptography Knowledge Category

Example/s of category

Teaching methodology

FACT

Plaintext

Use example of Plaintext–Human language understandable by Sender and receiver.

Key (message:“welcome to third year diploma”) Cipher Text

Show any message is Codified by replacing or reposting. KEY is “3” Alphabet A Codified by key “3” to Alphabet “C” Show example of codified message like MOUSE is code to “UEMOS”

CONCEPT

Cryptography, Cryptanalysis

Use appropriate example to show the converting of plaintext to cipher text and vice-versa – “In war times message is cryptograph and sent in order to protect from enemy.”

Encryption

Decryption

Private Key

Public Key

Show example of encoding plaintext to Cipher text: Eg. ”Computer” to” retupmoc” Show example of decoding Cipher text to Plaintext Eg.“retupmoc” to “Computer” Show example of key which need to be kept secret:

Lecture No.

Topic/ Subtopic to be covered

1  Introduction to Data Encryption Technique “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 11  What is Cryptography? – Draw diagram “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No1314  What is Cryptanalysis? “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 14-15  Application of Cryptography “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 14-15

Website   

http://en.wikipedia.org/wiki/Cryptography http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf http://cs.stanford.edu/people/eroberts/cs181/projects/dvd- css/cryptography.htm



Classical Encryption Technique used by Sender and Recipient

2 “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 11



State 2 types of Encryption Methods? “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 12

iii. Give various components of Symmetric Encryption And Decryption

Process – Use Diagram “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 12-13

Website:  http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf

PPT – 1.

https://www.cs.purdue.edu/homes/ninghui/.../526_Fall12_topic02.ppt

3 iv. Define Substitution Cipher

“Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 15 v. Working principle of Caesar cipher “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 15-16

Ex: message “MOUSE” CODED MSG: UEMOS vi. State advantage and disadvantages of Caesar Cipher “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 16 vii. Working principle of Monoalphabetic cipher “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 16-17

Website  http://www.math.uic.edu/CryptoClubProject/CCpacket.pdf

PPT – 

https://www.cs.usfca.edu/~brooks/S03classes/cs486/lectures/lecture-3.ppt

4 1. Working principal of Playfair cipher – Show example “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 17-19 2. Hill cipher – Show example “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 19-21 Website http://www.ling.ohio-state.edu/~cbrew/2008/spring/playfair.pdf PPT https://www.uop.edu.jo/material/1843212812010.ppt

5 a) Define Transposition cipher. State its 2 types “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 26-27 b) How Row transposition cipher works – Use example “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 2627

Website 6

 http://courses.cs.tamu.edu/pooch/665_spring2008/Australian-sec-2006/less05.html a) Working principle of One Time Pad – Give example & Solve it “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 24

PPT

https://www.cs.usfca.edu/~brooks/S03classes/cs486/lectures/lecture-3.ppt

7

b) What is Stegnography? – Flow diagram “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 28 

Uses of Stegnography “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 28



Stegnography and security “Cryptography and Information Security” by V.K.Pachghare , Chapter-2, Page No 28

Website8

 http://arxiv.org/ftp/arxiv/papers/0912/0912.2319.pdf  Introduction to Digital Signatures,

“Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no -204 

Implementation of Digital Signature o Use Flow diagram for explanation “Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no -206  Association of Digital signature and Encryption “Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no -206

Website http://www.youdzone.com/signature.html  http://www.infosec.gov.hk/english/itpro/public_main.html

9



What are Digital Signature Algorithm “Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 208



Working Principle of Various Digital Signature Algorithm “Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 209-212

Websitea) http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf

10



Authentication Protocols – List different Protocols “Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 214

11



What is Digital Signature Standards “Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 213

Website12

 http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf  http://courses.cs.tamu.edu/pooch/665_spring2008/Australian-sec-2006/less19.html  Give Application Digital Signature Standards “Cryptography and Information Security” by V.K.Pachghare Chapter 10 page no 213-214

Website http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf

Topic 4 Name: Data Recovery and Cyber Security Knowledge Category

Example/s of category

Teaching methodology

FACT

File

Use appropriate example of any Software File like DOC, PPT or EXE file

Act

Use appropriate example of any Government Ragging Act 2009 or any related IT Act or IPC Act, Copyright Act

Crime

Use appropriate example of Crime For example – Internet Fraud, any Criminal Activity or Hacking Computer System

Law

CONCEPT

Cyber Crime Hacking & Cracking

Piracy

Investigation

PROCEDURE

Use any appropriate example of Hacking like Facebook hacking etc. Use any appropriate example like Software Piracy, CD Piracy etc Use any appropriate example of investigation bureau

Cyber Law

Use any appropriate PPT or example like IT Act 1961 etc. Use any appropriate PPT

IT Act 2000, 2008

Use any appropriate PPT

Data Recovery Tools

Use

IT Act

PRINCIPLE

Use appropriate example of Indian Government Law like Murder Law etc Use any appropriate PPT

any

appropriate

Freely available tool like -

Lecture No. 1

Topic/ Subtopic to be covered

      PPTs    

2

   

What is Data Recovery What is Computer File - Reasons of Data lost Procedure to recover Deleted file from FAT & NTFS Partition What is Partitioning in Computer System – Types of Partitions Reasons of Partition damage o List out the reasons Formatted Partition Recovery Procedure (FAT / NFTS) http://www.aboutpartition.com/types-of-hard-drive-partitions/ http://www.recuperationdedonneesperdues.com/data-recovery http://www.robertuniverse.com/introduction-to-data-recovery/ http://psonlinehelp.equallogic.com/V4.2/Content/AdminNewBook/AdminNe w_recover.htm Data Recovery Categories Different Tools available for Windows etc. – List of various freely available tools on Internet Procedure of Data Recovery – Give step wise example Data Recovery Ethics

Website a) http://pcsupport.about.com/od/filerecovery/tp/free-file-recoveryprograms.htm b) http://transparen.com/data-protection-group/data-recovery-ethics

3

 What is Cyber Crime “Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 181  Different Types of Cyber Crime o Use tree diagram for Types of Cyber Crime “Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 182 PPTs –  http://www.slideshare.net/aemankhan/cybercrimeppt-27376284  https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7& cad=rja&uact=8&sqi=2&ved=0CEIQFjAG&url=http%3A%2F%2Fwww.cy berseminar.cdit.org%2Fpdf%2F09_02_09%2Floknath.ppt&ei=kceiU_aJ9OHuATko4BA&usg=AFQjCNGmpx90JfvtJWuJde2U7XfLaVF7Zg&bvm =bv.69411363,d.c2E

4

  

What is Hacking & Cracking – Types of Hackers Virus & its attacks – List types of attacks like Dos, DDos… Define terms – Pornography, Software Piracy o Use example like CD Piracy etc. “Information Security and Cyber Laws” by Saurabh Sharma Chapter 7 Page no 174 Website – a) http://www.legalservicesindia.com/articles/cyhac.htm b) http://evestigate.com/cyber-crime-hacker-terms-to-know/

5

 What is Intellectual Property  Copyright,  Patents  Industrial Design Rights  Trademark – Use example like logo of MSBTE etc.  What is Industrial Property “Information Security and Cyber Laws” by Saurabh Sharma Chapter 7 Page no 166  Define term – Mail Bombs, Bug Exploits Website – a) http://www.wipo.int/export/sites/www/freepublications/en/intproperty/450/ wipo_pub_450.pdf

6

7

PPTs –  http://www.slideshare.net/mahmoodttc/intellectual-property-ppt-final  Which are different types of legal Systems & its laws  Cyber Crime Investigation – its procedure Website  http://www.slideshare.net/tabrezahmad/cybercrime-investigation  http://www.scribd.com/doc/94789254/Ppt-on-Investigation-Method-ofCyber-Crime  Need of Cyber Law “Cyber Crimes and related Laws” by Saurabh Sharma Chapter 8 Page no 184 & 187  What is Cyber Laws – Definition of Cyber Law “Cyber Crimes and related Laws” by Saurabh Sharma Chapter 8 Page no 184 PPTs http://www.slideshare.net/Arnab_Roy_Chowdhury/cyber-law-15036761

8  IT Act 2000- Objectives, Scope, Provisions, Advantages & disadvantages “Information Security and Cyber Laws” by Saurabh Sharma Chapter 8 Page no 185



o List out the Chapters IT Act 2008 – Modification in IT Act 2000, Characteristics o List out the Chapters

PPT –  http://www.slideshare.net/YogendraWagh/it-act-ppt-1111  http://www.powershow.com/view1/268863ZDc1Z/Information_Technology_Act_2000_v_s_2008_powerpoint_ppt_pre sentation

Topic 5 Name: Access, Physical Control and Compliance Standards Knowledge Category

Example/s of category

FACT

Identification

CONCEPT

Use any physical mark of identification example like Green color eyes . Use appropriate example Biometrics of Biometrics – Thumb impression used in attendance system of Physical access control college. Use example of Door Security system or Digital Locker –Thumb impression is used to open lock etc. Compliance Standards Acting according to certain accepted standard .Eg like ISO standard Authorization

Authentication

Framework

PRINCIPLE

Teaching methodology

Kerberos Model

Specifying access rights to particular resources Eg: human resources staff is normally authorized to access employee records. It includes formalized as access control rules in a computer system. Accepting proof of identity given by a credible person examples like College ID card or Employee ID, Passport Structure of Computer System Use example of Software frameworks include support programs, compilers, code libraries, tool sets, and API User appropriate PPTs &

Lecture No.

Topic/ Subtopic to be covered

1

 What is Identification? – Use example like Photo ID card “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 234  Define Authorization? State its features “Principles of Information Security” by By Michael E. Whitman , Herbert J. Mattord Chapter 6 Page no 249  What is Authentication? “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 234  State features of Biometrics? – Use example like Thumb Reader etc. “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 241 

Give various element involved in Biometrics System – Show diagram “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 241

 How Single Sign- on works? – Use diagram “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 242

Website –  http://www.cyberciti.biz/faq/authentication-vs-authorization/  http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.h  http://www.biometrics.gov/  PPT –  www.cse.fau.edu/~security/public/BiometricsPresentation.ppt  https://www.owasp.org/.../OWASPSanAntonio_2006_08_SingleSignO n.

2 

Describe Kerberos Model? o Use various servers used in Kerberos o Draw diagram “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 243  Show relation of Kerberos with Authentication Ex: Student is allowed to enter in Library hall by checking College ID and entering name in Register and Verify by Librarian or any other suitable examples “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 243

 How Remote Access works? “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 247  Remote user access and Authentication “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 10 Page No 247 Website: a) http://technet.microsoft.com/en-us/library/cc780469(v=ws.10).aspx b) http://www.google.co.in/imgres?imgurl=&imgrefurl=http%3A%2F%2Fwww.codep roject.com%2FArticles%2F27554%2FAuthentication-in-web-services-using-C-andKerbero&h=0&w=0&tbnid=qv2CJmNFmv7QYM&zoom=1&tbnh=186&tbnw=27 0&docid=IGaJwLDTXe1FmM&tbm=isch&ei=GeoU_3TCZKgugS8r4LwCQ&ved=0CAIQsCUoAA c) https://software.intel.com/sites/manageability/AMT_Implementation_and_Referenc e_Guide/default.htm?turl=WordDocuments%2Fintroductiontokerberosauthenticatio n.htm

PPT: a) www.obscure.org/~jafitz/250_p1/Kerberos.ppt b) www.isi.edu/~annc/classes/grid/lectures/sivaLecture.ppt

3  What is Physical access control? Ex: Use example of Door Security system or Digital Locker –Thumb impression is used to open lock etc “Principles of Information Security” by By Michael E. Whitman , Herbert J. Mattord Chapter 9 Page no 400 a) What are threat invoked in Physical access “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 8 Page No 195. a) Need for Physical Security “Information System Security” by Nina Godbole Chapter 7 Page No 101

Website –  http://www.cdn.com/securitysystemPhysical.aspx 4

b) What is Physical Security – example like wall, security dogs, safety doors etc. “Information System Security” by Nina Godbole Chapter 7 Page No 102 c) How to provide physical security “Information Security Principles and Practices” by Mark Merkov & Jim Breithaupt Chapter 8 Page No 197, 198

Website –  http://www.cdn.com/securitysystemPhysical.aspx 5

 Define Compliance in general term  What is Compliance Standard  Implementing and Information Security Management System (ISMS) “Information System Security” by Nina Godbole Chapter 4 Page No 64 and Chapter 23Page No 424 Website:  www.oxforddictionaries.com/definition/english/compliance  http://www.immusec.com/en/implementation-information-securitymanagement-system  https://www.aiche.org/ccps/topics/elements-process-safety/commitmentprocess-safety/compliance-standards/introduction

6 

ISO 27001“Information System Security” by Nina Godbole Chapter 22 Page No 400



ISO 20000 “Information System Security” by Nina Godbole Chapter26 Page No 470 BS25999







PCI DSS “Information System Security” by Nina Godbole

Website     

www.iso.org/iso/home/standards/management-standards/iso27001.htm www.iso27001security.com http://www.standards.org/standards/listing/iso_20000

https://www.pcisecuritystandards.org/security_standards/ http://www.securityassessment.com/files/presentations/PCI_DSS_Presentation_0107.pdf  https://www.set.or.th/.../BCM%20with%20PWC%2027%20April%20v3.

PPT

7



www.ermantaskin.com/bcm/BS25999_ERMAN_TASKIN.ppt

How ITIL frameworks help the IT organization? “Information System Security” by Nina Godbole Chapter26 Page No 470

Website http://www.itil-officialsite.com/AboutITIL/WhatisITIL.aspx  http://www.best-management-practice.com/gempdf/itil_the_basics.pdf

PPT a) https://www.ok.gov/OSF/documents/ITILOverview.ppt b) www.chakarov.com/powerpoints/itilv3overview.ppt

8



How COBIT framework works in IT organization “Information System Security” by Nina Godbole Chapter 22 Page No 400 and Chapter 25 Page No 449 Website: a) http://www.isaca.org/cobit/documents/cobit-5-introduction.pdf b) http://www.counterpoint.co.za/pages/cobit.htm c) http://www.isaca.org/COBIT/Documents/COBIT5-Ver2-FrameWork.pdf ppt: a) www.isaca.org/cobit/documents/cobit5-introduction.ppt b) https://www.vpit.ualberta.ca/frameworks/ppt/cobit_introduction.pp

View more...

Comments

Copyright � 2017 NANOPDF Inc.
SUPPORT NANOPDF